Date: Fri, 7 Sep 2012 20:12:04 +0200 From: Lukas Odzioba <lukas.odzioba@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cracking Mountain Lion hashes (WIP) 2012/9/7 Dhiru Kholia <dhiru.kholia@...il.com>: > On Fri, Sep 7, 2012 at 10:59 PM, Alexander Cherepanov <cherepan@...me.ru> wrote: >> On 07.09.2012 20:28, Dhiru Kholia wrote: >>> Now we need to parse the output of ml2john.py program and figure out >>> what the output means i.e. what is the iteration count, what is salt >>> etc. >> >> Well, ShadowHashData field is also plist. Convert it with the same >> script and you get 'salt', 'entropy' and 'iterations'. > > Thanks!, that worked. > > Next question, where is the actual pbkdf2 hash? I don't see it. Can you post it? If it is pure sha512pbkdf2 it should be consistent with this: from passlib.hash import grub_pbkdf2_sha512 hash = grub_pbkdf2_sha512.encrypt("password", rounds=10964, salt="salt") print hash
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.